Free Cybersecurity and GRC awareness content. For adults.
Content – Workstations and Devices
Below you’ll find the content for ‘Workstations and Devices’ – this covers employee workstations, mobiles devices and acceptable use policy. It also covers password use and access control issues.
To download, simply click on the image to get the full size version and then right-click and select ‘Save Image as’
Your employees – the weak link
Machine learning on the other hand…
How do I get passwords to you?
Even adults have a hard time.
Run free!
No, wait, your password has expired.
Problem employees
A solution for everyone…
Sing your password
No, not that loud.
Here’s an e-mail for John!
What do you mean there’s more than one John in my address book?
Facial encryption
The new anti-face stealing measure
Countdown to password lockout
Lets watch you sweat.
Pocket CISO
Everyone wants one.
If you can’t login
You can’t cause any trouble…
A clone!
Is your own medicine the best medicine?
How many ways can I violate security in one go?
Let me count the ways.
A Higher Power
Maybe HE has the answers…
Let kids run security for a while
What could go wrong?
Pizza delivery
Danger is everywhere, even pizza
A mindmap
How to live a health Cyber life!
Perfect physical access control
Mix a dash of witchcraft with a sprinkling of technology…
So the internet doesn’t work…
What about the INTERWEB?
Identity theft
It’s ok if I asked for permission
Pop-up windows
No matter how many I slay – they return!
Access Control audits
What were you expecting exactly?
Least Privilege Explained
Its easy when you have a horse!
How to get employees to take care of their tokens
Give them a reason to care!
Terms and conditions
Lets try reading all of them!
The Cybersecurity Angel
What would you do with 3 wishes?
Looking for Mediocre Employees
Because the good ones are already taken.
Tailgating 101
A how-to guide
From the director of ‘I forgot my password’
It’s trying to get in…
Workstation safety tips
There’s mention of bitcoin so worth reading…
Viruses
Hilarious!
A Cyber Safety guide
With extra sarcasm!
Ransomware – before the internet
Can I encrypt that for you?
Sophisticated vs Unsophisticated attack
I hack you EZ
Peasants
Even they are protected from themselves.
Zero trust security
Doesn’t translate well to real life
If you had a conscience
He would totally resemble a floating blue ball of fire
Password: Which characters can ye contain?
Let me run them by you, one by one.
What do you do with USB keys you find on the floor?
Plug them into the first workstation you see of course!
This work laptop sucks
My personal laptop works so much better.
Brute force
Even gets you into nightclubs
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.